未来网络中跨层设计和分布式增强的移动管理
发布时间:2021-01-26 02:35
在新一代信息网络技术领域中,未来网络(Future Networks)将是重要的发展趋势与方向,成为各个国家优先关注的重要领域,对未来网络的研究已经成为世界各国占领信息技术制高点、增强国际竞争力的战略性需求。未来网络包含云计算和下一代网络,在这个网络中,大量的移动节点(MN)能够跨越异构网络执行动态运动。动态管理是当前未来网络研究的一个重要课题,本论文旨在为未来网络设计有效的动态管理机制,开展了以下研究工作。针对高认证时延和脆弱的流动性的限制,提出一种新型安全的跨层的基于主机的移动管理方案,即分级认证密钥管理(HAKM)。为了尽量减少在下一代网络的认证时延以及防止各种类型的攻击,本文结合会话发起协议(SIP)与分层移动式IPv6(HMIPv6协议)来为会话移动进行本地认证。实验结果表明,与现有方法比较,该方案具有更低的认证时延和更高效的基于主机的移动管理。针对基于网络的移动性,例如切换时延,分组丢失,并且认证的复杂关联的局限性,提出了一种新型的基于网络的方案,即跨层本地化认证机制(CLAM),这种机制可以集成代理移动IPv6和SIP,在实时和非实时通信中进行本地身份认证。CLAM的基础...
【文章来源】:大连理工大学辽宁省 211工程院校 985工程院校 教育部直属院校
【文章页数】:138 页
【学位级别】:博士
【文章目录】:
Abstract
摘要
Introduction
1 Background
1.1 Mobile Generations
1.2 Future Networks/Next Generation Networks(NGNs)
1.2.1 Service Awareness
1.2.2 Data Awareness
1.2.3 Environmental Awareness
1.2.4 Social and Economic Awareness
1.3 Mobility Management in Future Networks
1.3.1 Host-based Mobility Protocols
1.3.2 Network-based Mobility Protocols
1.3.3 Distributed Mobility Management
1.3.4 Session Mobility
1.4 Security of Mobility Management
1.5 Research Challenges
1.6 Summary
2 Secure Cross-layer Host-based Mobility Management
2.1 Introduction
2.2 Related Work
2.3 Hierarchical Authentication Key Management(HAKM)
2.4 Algorithm of HAKM
2.4.1 Initialization Phase
2.4.2 Authentication Phase
2.4.3 Secure Session Mobility Phase
2.5 Performance Analysis
2.5.1 Analytical Authenticated Mobility Models
2.5.2 Latency Analysis
2.6 Security Analysis
2.7 Results Comparison and Discussions
2.8 Summary
3 Secure Cross-layer Network-based Mobility Management
3.1 Introduction
3.2 Related Work
3.3 Network Architecture
3.4 Cross-layer Localized Authentication Mechanism
3.4.1 Registration
3.4.2 Login Phase
3.4.3 MN's Attachment and Authentication Phase
3.4.4 Handoff Phase
3.4.5 Session Key Update Phase
3.4.6 Password Change Phase
3.5 Performance Analysis
3.5.1 Handover Latency
3.5.2 Signaling Cost
3.5.3 Communication Overhead
3.5.4 Computational Cost
3.6 Security Analysis
3.7 Results Comparison and Discussions
3.7.1 Handover Latency
3.7.2 Signaling Cost
3.7.3 Packet Loss
3.8 Summary
4 Secure Distributed Mobility Management
4.1 Introduction
4.2 Related Work
4.3 Secure Network-based Distributed Mobility Management
4.3.1 Basic Design
4.3.2 Data Mobility Anchor Decision Process
4.3.3 Authentication
4.3.4 Dynamic Mobility Management
4.3.5 Optimized Routing
4.3.6 Handover
4.4 Performance Analysis
4.4.1 Handover Latency
4.4.2 Handover Blocking Probability
4.4.3 Packet Loss
4.4.4 Communication Overhead
4.4.5 Computational Cost
4.5 Security Analysis
4.6 Results Comparison and Discussions
4.6.1 Handover Latency
4.6.2 Handover Blocking Probability
4.6.3 Packet Loss
4.7 Summary
Conclusion
Abstract of Innovation Points
References
Appendix A List of Figures
Appendix B List of Tables
Appendix C Definitions of Major Terms
Published Academic Papers during PhD Period
Acknowledgement
About the Author
本文编号:3000319
【文章来源】:大连理工大学辽宁省 211工程院校 985工程院校 教育部直属院校
【文章页数】:138 页
【学位级别】:博士
【文章目录】:
Abstract
摘要
Introduction
1 Background
1.1 Mobile Generations
1.2 Future Networks/Next Generation Networks(NGNs)
1.2.1 Service Awareness
1.2.2 Data Awareness
1.2.3 Environmental Awareness
1.2.4 Social and Economic Awareness
1.3 Mobility Management in Future Networks
1.3.1 Host-based Mobility Protocols
1.3.2 Network-based Mobility Protocols
1.3.3 Distributed Mobility Management
1.3.4 Session Mobility
1.4 Security of Mobility Management
1.5 Research Challenges
1.6 Summary
2 Secure Cross-layer Host-based Mobility Management
2.1 Introduction
2.2 Related Work
2.3 Hierarchical Authentication Key Management(HAKM)
2.4 Algorithm of HAKM
2.4.1 Initialization Phase
2.4.2 Authentication Phase
2.4.3 Secure Session Mobility Phase
2.5 Performance Analysis
2.5.1 Analytical Authenticated Mobility Models
2.5.2 Latency Analysis
2.6 Security Analysis
2.7 Results Comparison and Discussions
2.8 Summary
3 Secure Cross-layer Network-based Mobility Management
3.1 Introduction
3.2 Related Work
3.3 Network Architecture
3.4 Cross-layer Localized Authentication Mechanism
3.4.1 Registration
3.4.2 Login Phase
3.4.3 MN's Attachment and Authentication Phase
3.4.4 Handoff Phase
3.4.5 Session Key Update Phase
3.4.6 Password Change Phase
3.5 Performance Analysis
3.5.1 Handover Latency
3.5.2 Signaling Cost
3.5.3 Communication Overhead
3.5.4 Computational Cost
3.6 Security Analysis
3.7 Results Comparison and Discussions
3.7.1 Handover Latency
3.7.2 Signaling Cost
3.7.3 Packet Loss
3.8 Summary
4 Secure Distributed Mobility Management
4.1 Introduction
4.2 Related Work
4.3 Secure Network-based Distributed Mobility Management
4.3.1 Basic Design
4.3.2 Data Mobility Anchor Decision Process
4.3.3 Authentication
4.3.4 Dynamic Mobility Management
4.3.5 Optimized Routing
4.3.6 Handover
4.4 Performance Analysis
4.4.1 Handover Latency
4.4.2 Handover Blocking Probability
4.4.3 Packet Loss
4.4.4 Communication Overhead
4.4.5 Computational Cost
4.5 Security Analysis
4.6 Results Comparison and Discussions
4.6.1 Handover Latency
4.6.2 Handover Blocking Probability
4.6.3 Packet Loss
4.7 Summary
Conclusion
Abstract of Innovation Points
References
Appendix A List of Figures
Appendix B List of Tables
Appendix C Definitions of Major Terms
Published Academic Papers during PhD Period
Acknowledgement
About the Author
本文编号:3000319
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/3000319.html